Client-side Attacks

exiftool -a -u quote.pdf

Passive recon viewing metadata of publicly available documents to view potential installed software on the target machine

Use Canary Tokens to fingerprint the remote machine

Macros in Word documents

Save as .doc (Word 97-2003 Document)

Open powershell

Reverse shell macro

Encode in base64

Python script to break ouput into smaller chunks

Final Macro script

Last updated